Skip to main content

Digital Security: An Enigma

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

The subject security has wide coverage and it is growing with every passing day. As civilization progressed from Agrarian to semi-industrialization, advanced industrialization and finally to present ICT (Information and Communication Technology) age, concerns for security are increasingly taking in all objects from physical to digital. It augmented apprehensions from losing material wealth to most abstract entities like wealth of knowledge in digital form. Today’s technology allows wired and wireless access to tangible and intangible resource-built ups (material to digital), digitally, and steal the same if need arises. The riddle is to defend our own resources from the rapacious hand of ubiquitous computing and communicating technology evolved by us. The art and science of hiding and securing precious resources from possible predators in physical or digital forms make it complex and challenging. The enigma remains in the fact that predator uses same technology and at times also makes rule that prevails over others.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Weiser M (1991) The computer for the 21st century. Scientific American, Sept 1991, pp 94–104

    Google Scholar 

  2. Weiser M, Brown JS (1996) The coming age of calm technology. Xerox PARC, 5 Oct 1996

    Google Scholar 

  3. O’Reilly T, Battelle J. Web squared: web 2.0 five years on; special report

    Google Scholar 

  4. Kleinrock L. Nomadic computing—an opportunity CCR 4/95

    Google Scholar 

  5. Burgin M, Eberbach E (2012) Evolutionary computation and the processes of life. ACM Publication

    Google Scholar 

  6. La Porta TF, Sabnani KK, Gitlin RD. Challenges for nomadic computing: mobility management and wireless communications. Bell Laboratories

    Google Scholar 

  7. Avijit D. Knowledge ubiquity in web 2.0 paradigm. Innovation in information system and technology. ITCDC ‘09 Macmillan Publications, pp 234–238

    Google Scholar 

  8. Avijit D. Digital security: a moving target. Int J Electr Electron Comput Sci Eng. Special issue—TeLMISR 2015. ISSN: 2348-2273

    Google Scholar 

  9. Barcena MB, Wueest C (2015) Insecurity in the Internet of Things. Symantec, security response, version 1.0, 12 March 2015

    Google Scholar 

  10. Symantec, ISTR, April 2015, vol 20

    Google Scholar 

  11. Symantec, Insecurity in Internet of Things, version 1.0, 12 March 2015

    Google Scholar 

  12. Cortada JW, Marc GAMLN How nations thrive in the information age. IBM Institute for Business Value, IBM Global Business Services

    Google Scholar 

  13. Kephart JO, Chess DM (2003) Autonomic computing. IBM Thomas J. Watson Research Center, IEEE Computer Society

    Google Scholar 

  14. https://bensontao.wordpress.com/2013/10/06/vivante-internet-of-things

  15. http://securityaffairs.co/wordpress/34974/cyber-crime/iot-security-symantec.htm

  16. INSEAD (2014) Global information technology report

    Google Scholar 

  17. ITU (2015) Global cyber security index & cyberwellness profile report

    Google Scholar 

  18. Lytinen K, Yoo Y. The next wave of nomadic computing: a research agenda for information systems research. Working papers on information systems, Sprouts. ISSN: 1535-6078

    Google Scholar 

  19. Cousins KC, Robey D. Human agency in a wireless world: patterns of technology use in nomadic computing environments. Information and Organization; Science Direct

    Google Scholar 

  20. Venkatasubramanian K, Gupta SKS (2006) Security solutions for pervasive healthcare. P1: Binaya Dash, 8 Dec 2006, vol 11:58, pp AU7921–AU7921˙C015

    Google Scholar 

  21. Kleinrock L. Nomadic computing. Computer Science Department, Los Angeles

    Google Scholar 

  22. Davis RM. Evolution of computers and computing. Science 195

    Google Scholar 

  23. Satyanarayanan M. Pervasive computing: vision and challenges. School of Computer Science, Carnegie Mellon University

    Google Scholar 

  24. TechTarget, Security Media Group. Information security, October 2014, vol 16, no 8

    Google Scholar 

  25. http://www.slideshare.net/MhaeLyn/iot-30545508

Download references

Acknowledgements

Contributions of theorists who can look into the future and guide science and technologies beyond horizon are deeply acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Avijit Dutta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dutta, A. (2018). Digital Security: An Enigma. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics